default search action
Sambuddho Chakravarty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Koustuv Kanungo, Rahul Khatoliya, Vishrut Arora, Aairah Bari, Arani Bhattacharya, Mukulika Maity, Sambuddho Chakravarty:
How Many Hands in the Cookie Jar? Examining Privacy Implications of Popular Apps in India. EuroS&P 2024: 741-757 - [c13]Devashish Gosain, Kartikey Singh, Rishi Sharma, Jithin Suresh Babu, Sambuddho Chakravarty:
Out in the Open: On the Implementation of Mobile App Filtering in India. PAM (2) 2024: 19-36 - [c12]Zeya Umayya, Dhruv Malik, Arpit Nandi, Akshat Kumar, Sareena Karapoola, Sambuddho Chakravarty:
COMEX: Deeply Observing Application Behavior on Real Android Devices. CSET @ USENIX Security Symposium 2024: 100-109 - 2023
- [j5]Piyush Kumar Sharma, Rishi Sharma, Kartikey Singh, Mukulika Maity, Sambuddho Chakravarty:
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System. Proc. Priv. Enhancing Technol. 2023(1): 589-607 (2023) - 2021
- [j4]Devashish Gosain, Mayank Mohindra, Sambuddho Chakravarty:
Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs. Proc. Priv. Enhancing Technol. 2021(2): 173-193 (2021) - [c11]Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty:
Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels. AsiaCCS 2021: 147-161 - [c10]Devashish Gosain, Aishwarya Jaiswal, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Telemetron: Measuring Network Capacity Between Off-Path Remote Hosts. LCN 2021: 351-354 - 2020
- [j3]Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, Hrishikesh B. Acharya, Sambuddho Chakravarty:
SiegeBreaker: An SDN Based Practical Decoy Routing System. Proc. Priv. Enhancing Technol. 2020(3): 243-263 (2020) - [j2]Piyush Kumar Sharma, Shashwat Chaudhary, Nikhil Hassija, Mukulika Maity, Sambuddho Chakravarty:
The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor. Proc. Priv. Enhancing Technol. 2020(4): 69-88 (2020) - [i5]Piyush Kumar Sharma, Shashwat Chaudhary, Nikhil Hassija, Mukulika Maity, Sambuddho Chakravarty:
The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor. CoRR abs/2007.04673 (2020)
2010 – 2019
- 2018
- [c9]Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty:
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. Internet Measurement Conference 2018: 252-264 - [i4]Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Mending Wall: On the Implementation of Censorship in India. CoRR abs/1806.06518 (2018) - [i3]Hrishikesh B. Acharya, Sambuddho Chakravarty, Devashish Gosain:
Few Throats to Choke: On the Current Structure of the Internet. CoRR abs/1806.07038 (2018) - [i2]Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty:
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. CoRR abs/1808.01708 (2018) - 2017
- [c8]Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya:
The Devil's in The Details: Placing Decoy Routers in the Internet. ACSAC 2017: 577-589 - [c7]Hrishikesh B. Acharya, Sambuddho Chakravarty, Devashish Gosain:
Few Throats to Choke: On the Current Structure of the Internet. LCN 2017: 339-346 - [c6]Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Mending Wall: On the Implementation of Censorship in India. SecureComm 2017: 418-437 - [i1]Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya:
The Devils in The Details: Placing Decoy Routers in the Internet. CoRR abs/1710.05527 (2017) - 2015
- [j1]Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
Detection and analysis of eavesdropping in anonymous communication networks. Int. J. Inf. Sec. 14(3): 205-220 (2015) - 2014
- [b1]Sambuddho Chakravarty:
Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication. Columbia University, USA, 2014 - [c5]Sambuddho Chakravarty, Marco Valerio Barbera, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records. PAM 2014: 247-257 - 2011
- [c4]Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis:
Detecting Traffic Snooping in Tor Using Decoys. RAID 2011: 222-241 - 2010
- [c3]Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis:
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. ESORICS 2010: 249-267
2000 – 2009
- 2008
- [c2]Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis:
Identifying Proxy Nodes in a Tor Anonymization Circuit. SITIS 2008: 633-639 - 2007
- [c1]Ashutosh Dutta, Sambuddho Chakravarty, Kenichi Taniuchi, Victor Fajardo, Yoshihiro Ohba, David Famolari, Henning Schulzrinne:
An Experimental Study of Location Assisted Proactive Handover. GLOBECOM 2007: 2037-2042
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint